Which of the following is an example of PII? (Choose two.)
Which of the following concepts is represented by the sale of customer email addresses to potential product vendors?
Which of the following can be used to stop an application that is no longer responding?
A user is logged in but unable to access a shared folder on the network. Which of the following security concepts is in place?
Which of the following represents the value of 9 with ones and zeros?
A student is setting up a laptop with a built-in camera for an online class. Upon logging in, the student is able to see the teacher, but the teacher is unable to see the student. Which of the following actions would most likely fix this issue?
A company updates its password policy to require that all passwords be reset every 60 days. Which of the following best describes this requirement?
A lab technician removes access from students who do not need to use a fileshare. Which of the following best describes this action?
Which of the following is considered an output device?
A database administrator wants to retrieve recently updated entries. Which of the following functions should the administrator run to complete the task?